Blog Jeff Martin

Jeff Martin

Jeff has spent over 15 years in Product roles helping both the organizations he worked for and their customers transform and measure their business processes, development, and QA. He especially enjoys cultural and mindset transformations for their ability to create lasting progress.

NVD Update: Help Has Arrived

There’s hope yet for the world’s most beleaguered vulnerability database.

Read More

NVD’s Backlog Triggers Public Response from Cybersec Leaders

The National Vulnerability Database’s backlog triggers a public response from cybersecurity leaders. Concerns raised, open letter to Congress

Read More

What You Need to Know About Hugging Face

Stay informed about the risks and challenges of AI models with Hugging Face. Learn how to identify and secure AI-generated code.

Read More

Secrets Management vs Secrets Detection: Here’s What You Need to Know

Learn about the importance of secrets management vs secrets detection in application security. Protect your sensitive data.

Read More

The Challenges for License Compliance and Copyright with AI

Discover the challenges of license compliance and copyright with AI-generated code in software development. Learn about legal risks.

Read More

Let’s Embrace Death in the Software Development Lifecycle

Learn why it’s important to let software products die gracefully rather than become zombies, affecting security and functionality over time.

Read More

What You Can Do to Stop Software Supply Chain Attacks

Learn how to stop software supply chain attacks with SBOMs, best practices, and prioritizing known vulnerabilities. Protect your software.

Read More

How Software Supply Chain Attacks Work, and How to Assess Your Software Supply Chain Security

Learn how software supply chain attacks work and how to to defend against malicious packages and data breaches.

Read More

CVSS 4.0 — What’s New?

Learn about the new features and improvements in CVSS 4.0, the Common Vulnerability Scoring System. Understand how to use it.

Read More

Understanding the Anatomy of a Malicious Package Attack

Learn to protect your applications from malicious packages with our guide. Understand the anatomy of attacks and how to prevent them.

Read More

What’s Driving the Adoption of SBOMs? What’s Next for Them?

Discover what’s driving the adoption of SBOMs and what’s next for them in terms of malicious packages and supply chain security.

Read More

A Guide to Standard SBOM Formats

Discover the importance of Software Bill of Materials (SBOM) and compare the three main formats – SPDX, CycloneDX, and SWID.

Read More

The Shift to the Cloud and its Implications for Application Security

Learn about the implications of shifting applications to the cloud on application security. Understand the shared responsibility.

Read More

Subscribe to our Newsletter

Join our subscriber list to get the latest news and updates

Thanks for signing up!